Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63419: n/a

0
Unknown
VulnerabilityCVE-2025-63419cvecve-2025-63419
Published: Wed Nov 12 2025 (11/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting (XSS) vulnerability in CrushFTP 11.3.6_48. The Web-Based Server has a feature where users can share files, the feature reflects the filename to an emailbody field with no sanitations leading to HTML Injection.

AI-Powered Analysis

AILast updated: 11/12/2025, 17:17:51 UTC

Technical Analysis

CVE-2025-63419 is a Cross Site Scripting (XSS) vulnerability identified in CrushFTP version 11.3.6_48, a popular web-based file transfer server. The vulnerability stems from the file sharing feature, where the filename is reflected directly into an email body field without any sanitization or encoding. This lack of input validation allows an attacker to inject arbitrary HTML or JavaScript code into the email content, which is then rendered in the recipient's browser when they view the email. The attack vector involves crafting a malicious filename that includes script code; when the server inserts this filename into the email body, the script executes in the context of the user's browser session. This can lead to various malicious outcomes such as stealing session cookies, redirecting users to phishing sites, or performing actions on behalf of the user. The vulnerability does not require prior authentication, increasing its risk profile, but does require the victim to interact with the malicious email content. There are no known public exploits or patches available at the time of publication, and the CVSS score has not been assigned. The flaw primarily affects confidentiality and integrity by enabling unauthorized script execution and potential data theft. The scope is limited to users receiving shared file emails from vulnerable CrushFTP servers. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those handling user-generated content in email communications.

Potential Impact

For European organizations, the impact of CVE-2025-63419 can be significant, particularly for those relying on CrushFTP for secure file sharing and transfer. Exploitation could lead to unauthorized access to sensitive information, including credentials and session tokens, potentially compromising internal systems and data confidentiality. This is especially critical for sectors like finance, healthcare, and government, where data protection regulations such as GDPR impose strict requirements on data security and breach notification. The vulnerability could also facilitate phishing campaigns by injecting malicious content into legitimate file sharing emails, increasing the risk of social engineering attacks. Additionally, compromised user sessions could allow attackers to perform unauthorized actions, impacting system integrity and availability. Although no active exploits are reported, the lack of a patch means organizations remain exposed until mitigations are applied. The reputational damage and regulatory penalties following a breach could be severe, making timely remediation essential.

Mitigation Recommendations

To mitigate CVE-2025-63419, organizations should implement the following specific measures: 1) Immediately review and restrict the use of CrushFTP version 11.3.6_48, considering temporary suspension of the file sharing feature if feasible. 2) Apply strict input validation and output encoding on all user-supplied data, especially filenames reflected in email bodies, to neutralize HTML and script content. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads in HTTP requests related to file sharing. 4) Educate users to be cautious with file sharing emails and to report suspicious content. 5) Monitor email systems for unusual patterns that may indicate exploitation attempts. 6) Engage with CrushFTP vendors or community to obtain patches or updates addressing this vulnerability. 7) Implement Content Security Policy (CSP) headers to restrict script execution in browsers where possible. 8) Conduct regular security assessments and penetration testing focused on web application input handling. These steps go beyond generic advice by focusing on the specific vector of reflected filenames in emails and the operational context of CrushFTP deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6914bf7cbe619665a24c2606

Added to database: 11/12/2025, 5:10:20 PM

Last enriched: 11/12/2025, 5:17:51 PM

Last updated: 11/12/2025, 6:17:22 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats